KR20210041932A - 보안 부팅 장치 및 그 동작 방법 - Google Patents
보안 부팅 장치 및 그 동작 방법 Download PDFInfo
- Publication number
- KR20210041932A KR20210041932A KR1020190124777A KR20190124777A KR20210041932A KR 20210041932 A KR20210041932 A KR 20210041932A KR 1020190124777 A KR1020190124777 A KR 1020190124777A KR 20190124777 A KR20190124777 A KR 20190124777A KR 20210041932 A KR20210041932 A KR 20210041932A
- Authority
- KR
- South Korea
- Prior art keywords
- public key
- comparison
- hashed
- key
- rsa
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 37
- 230000015654 memory Effects 0.000 claims abstract description 57
- 238000012795 verification Methods 0.000 claims abstract description 31
- 230000008569 process Effects 0.000 description 21
- 238000010586 diagram Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000000052 comparative effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Storage Device Security (AREA)
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020190124777A KR20210041932A (ko) | 2019-10-08 | 2019-10-08 | 보안 부팅 장치 및 그 동작 방법 |
EP20873436.8A EP4044056A4 (fr) | 2019-10-08 | 2020-08-31 | Appareil de démarrage sécurisé et procédé de fonctionnement associé |
US17/767,714 US20240086543A1 (en) | 2019-10-08 | 2020-08-31 | Secure booting apparatus and operating method thereof |
CN202080071074.8A CN114514725A (zh) | 2019-10-08 | 2020-08-31 | 安全引导装置及其操作方法 |
PCT/KR2020/011608 WO2021071090A1 (fr) | 2019-10-08 | 2020-08-31 | Appareil de démarrage sécurisé et procédé de fonctionnement associé |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020190124777A KR20210041932A (ko) | 2019-10-08 | 2019-10-08 | 보안 부팅 장치 및 그 동작 방법 |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20210041932A true KR20210041932A (ko) | 2021-04-16 |
Family
ID=75438272
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020190124777A KR20210041932A (ko) | 2019-10-08 | 2019-10-08 | 보안 부팅 장치 및 그 동작 방법 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20240086543A1 (fr) |
EP (1) | EP4044056A4 (fr) |
KR (1) | KR20210041932A (fr) |
CN (1) | CN114514725A (fr) |
WO (1) | WO2021071090A1 (fr) |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070162964A1 (en) * | 2006-01-12 | 2007-07-12 | Wang Liang-Yun | Embedded system insuring security and integrity, and method of increasing security thereof |
US8254568B2 (en) * | 2007-01-07 | 2012-08-28 | Apple Inc. | Secure booting a computing device |
WO2013009619A2 (fr) * | 2011-07-08 | 2013-01-17 | Openkeak Inc. | Système et procédé pour valider des composants durant un processus de démarrage |
KR20140073384A (ko) * | 2012-12-06 | 2014-06-16 | 삼성전자주식회사 | 보안 부팅을 수행하는 칩 시스템과 이를 이용하는 화상형성장치 및 그 보안 부팅 방법 |
US9536094B2 (en) * | 2014-01-13 | 2017-01-03 | Raytheon Company | Mediated secure boot for single or multicore processors |
CN104883256B (zh) * | 2014-02-27 | 2019-02-01 | 中国科学院数据与通信保护研究教育中心 | 一种抵抗物理攻击和系统攻击的密钥保护方法 |
KR102617354B1 (ko) * | 2017-01-05 | 2023-12-26 | 삼성전자주식회사 | 보안 부트 시퀀서 및 보안 부트 장치 |
US10491401B2 (en) * | 2017-02-21 | 2019-11-26 | Google Llc | Verification of code signature with flexible constraints |
KR102434444B1 (ko) * | 2017-11-29 | 2022-08-19 | 한국전자통신연구원 | 가상 트러스트 컴퓨팅 베이스를 이용한 기기 보안성 검증 방법 및 장치 |
-
2019
- 2019-10-08 KR KR1020190124777A patent/KR20210041932A/ko unknown
-
2020
- 2020-08-31 CN CN202080071074.8A patent/CN114514725A/zh active Pending
- 2020-08-31 US US17/767,714 patent/US20240086543A1/en active Pending
- 2020-08-31 EP EP20873436.8A patent/EP4044056A4/fr active Pending
- 2020-08-31 WO PCT/KR2020/011608 patent/WO2021071090A1/fr active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2021071090A1 (fr) | 2021-04-15 |
EP4044056A4 (fr) | 2023-11-15 |
US20240086543A1 (en) | 2024-03-14 |
EP4044056A1 (fr) | 2022-08-17 |
CN114514725A (zh) | 2022-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9686248B2 (en) | Secure shared key sharing systems and methods | |
KR102168984B1 (ko) | 보안 디바이스 페어링 | |
EP3197089B1 (fr) | Procédé de configuration d'informations sécurisée, procédé d'authentification sécurisée et puce associée | |
US9959403B2 (en) | Information processing system for mutual authentication between communication device and storage | |
WO2021103839A1 (fr) | Architecture de renforcement de sécurité, procédé de chiffrement et de déchiffrement, terminal de mise en réseau de voitures, et véhicule | |
CN110555309A (zh) | 启动方法、装置、终端以及计算机可读存储介质 | |
CN111639325A (zh) | 基于开放平台的商户认证方法、装置、设备和存储介质 | |
CN117556430B (zh) | 一种安全启动方法、装置、设备及存储介质 | |
US20220382912A1 (en) | Using a trust anchor to verify an identity of an asic | |
US11734009B2 (en) | Parallel processing of fetch blocks of data | |
KR20210041932A (ko) | 보안 부팅 장치 및 그 동작 방법 | |
KR101973578B1 (ko) | 어플리케이션의 무결성 검증 방법 및 장치 | |
US11784807B2 (en) | Binding an ASIC to a trust anchor | |
KR102199464B1 (ko) | 컨소시엄 블록체인 참가 노드 간의 인증 방안 | |
CN117353920B (zh) | 一种密钥派生方法、处理器和相关设备 | |
US10574653B1 (en) | Secure posture assessment | |
US11816219B2 (en) | Binding a trust anchor and an ASIC | |
US12072981B2 (en) | Using a trust anchor to control functionality of an ASIC | |
TW201935358A (zh) | 程式驗證方法 | |
US20240078315A1 (en) | Secure booting system and operation method thereof | |
CN117544319A (zh) | 一种身份认证方法、处理器和相关设备 | |
WO2021063484A1 (fr) | Systèmes et procédés d'attestation | |
WO2019142306A1 (fr) | Dispositif à semi-conducteur, procédé de fourniture de données, procédé de décodage de données et programme | |
JP2022124424A5 (fr) | ||
CN116933293A (zh) | 面向多平台的多重加密软件认证保护方法及装置 |